New Army computer-based training (CBT) is making training more accessible, interactive, and fun for Soldiers. Project Director Sensors-Aerial Intelligence (PD SAI) and Project Manager Unmanned ...
MCLEAN, Va.--(BUSINESS WIRE)--Alion Science and Technology, an employee-owned technology solutions company, was awarded a three-year, $4.6 million task order from the Naval Air Warfare Center Training ...
SAN DIEGO – TargetSolutions, the leading provider of computer-based training management applications for public safety agencies, is excited to announce its new partnership with AlphaTRAC Products, the ...
Australia has formally accepted Lockheed Martin Australia’s training system under the AIR5428 acquisition contract. The training system for navy, army, and Royal Australian Air Force (RAAF) pilots ...
JOINT BASE LEWIS-MCCHORD, Wash. – The Western Air Defense Sector rolled out a cutting edge video game-like training system Aug. 26 to 27 at Joint Base Lewis-McChord, Washington. The system, called ...
A computer-based training program, customized to the layout of Hartsfield-Jackson Atlanta International Airport, is available to airport employees and tenants for training and testing purposes. The ...
With the constant exposure to risk and the limited resources to train drivers in person, many fleets are looking for ways to extend more training to drivers at a lower cost. The technologies that ...
Scientifically speaking, treatment options for students with attention deficits have long been limited. Outside of stimulant medication, and some behavior-modification strategies, few interventions ...
A brain exercise a day might keep you current—it might even revive your brain chemistry. In a landmark clinical trial led by ...
In the summer of 2021, analyst Gartner published its Market guide for security awareness computer-based training. It reported that the human element (85%) continues to be a primary catalyst for data ...
CISOs and security teams are a notoriously data-driven group. They want to have visibility into the cloud and on-premise systems to detect malicious activity. They want to know how their tech stack ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results